Posts by infocyte

The Next Evolution In Cyber Threat Hunting: Turn-key Threat Hunting & Incident Response—From The Cloud

cyber threat hunting cloud evolution

Infocyte, developer of the leading host-based cyber threat hunting and incident response platform, announced the release of Infocyte HUNT Cloud. The software-as-a-service platform is available for both end customers and through partners, such as MSSPs—enabling them to deploy turnkey multi-tenant threat hunting and response capabilities to complement their existing prevention and monitoring solutions.

Read More

7 Takeaways From The 2018 ‘State of Endpoint Security Risk’ Report

2018 endpoint security risk

As a rule, we avoid FUD (fear, uncertainty, and doubt) in our marketing. Cybersecurity is complex and confusing enough, so we prefer to focus on the facts without relying on scare tactics—yes, even on Halloween. That said, we also feel it’s important for people to understand their risks and what they’re up against. That way, you’re…

Read More

How Some States Are Taking Steps To Keep Election Hacking At Bay

cybersecurity voting election hacking

In the aftermath of the 2000 presidential election, amid the “hanging chads” fiasco in Florida upon which the election hinged, there was a tremendous effort to move toward voting automation to mitigate the perceived drawbacks of what was deemed antiquated paper ballots and/or mechanical/lever machine voting. As a result, the Elections Assistance Commission (EAC) was…

Read More

Market Intelligence Firm, IDC, Profiles Infocyte’s Managed Threat Hunting and Lightweight Incident Response Services

threat hunting incident response idc

International Data Corporation (IDC) has 1,100+ analysts and provides market intelligence, advisory services, and professional events in the IT, telecom, and consumer tech markets in over 110 countries worldwide. IDC publishes “Vendor Profiles” to inform people (prospects, customers, and the general public) about a particular company—its position in market, its products/services, and more. Earlier this…

Read More

Looking For A Cybersecurity Internship? Look No Further.

cybersecurity internship program

Starting a new career in cybersecurity can be overwhelming—especially if you lack hands-on experience. This is true for most people seeking a job in cybersecurity (a field with far more jobs than qualified candidates). We started our cybersecurity internship program for this very reason: to give professionals entering the cybersecurity field practical on-the-job training through…

Read More

White Paper: The Breach Detection Gap And Strategies To Close It

breach detection gap white paper

This white paper examines why adversaries are successful in persisting in networks; the limitations of existing security technologies and methodologies to discover threats once they are inside; and how dedicated hunt technology and processes can work with your existing security infrastructure to deny attackers the ability to persist undetected.

Read More

Webinar: 3 Challenges of Threat Hunting Using Endpoint Detection (EDR) Tools

In this webinar, threat hunter Chris Gerritz looks at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting, and examine some of the common misconceptions. He will also show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, big data or experts.

Read More

Webinar: 3 Challenges of Threat Hunting Using Log Analysis

This webinar provides an in-depth look at the challenges of using Log Analysis for threat hunting and examines some of the common misconceptions (i.e. you “can’t” hunt without logs and massive infrastructure investments are a prerequisite). It also shows how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, big data, and/or threat hunting experts.

Read More

Webinar: Forensic State Analysis – A New Approach to Threat Hunting

In this webinar, threat hunters from the SANS Institute and Infocyte discuss how to adapt Digital Forensics & Incident Response (DFIR) techniques to proactively hunt for unknown threats across an entire enterprise network — at scale. This approach is called Forensic State Analysis (FSA). Ultimately, FSA arms threat hunters with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, or big data.

Read More